IT Infrastructure & Applications

The Impact of Wearable Mobile on MDM Strategies

The Impact of Wearable Mobile on MDM Strategies

Move over, Rolex. Step aside, Armani. If the predictions hold true, tomorrow’s corporate climbers will all be ditching the designer accessories for the next big thing: namely, wearable computing devices. From smart watches to augmented reality glasses and contact lenses, today’s emerging tech toys have the potential to become tomorrow’s most valuable business tools. You […]

3 Steps to Energize Your Benchmark

3 Steps to Energize Your Benchmark

It is important for IT leaders to have access to current market information in order to make informed business decisions on how to run their department and buy the products and services they need. Benchmarking is one of the best means to deliver such information, but has traditionally been an expensive, time consuming and painful […]

By February 17, 2014 Read More →
Should CIO Be a Part-Time Job?

Should CIO Be a Part-Time Job?

Forgive me if the title of this article elevated your blood pressure or caused undue anxiety. The goal here is not to discount the role of the CIO in today’s business environment but to point out the fact that, in many companies, that role has significantly changed. Almost every company is becoming technology-centric, with digital […]

Insourcing: A Bridge Too Far

Insourcing: A Bridge Too Far

As the outsourcing industry has matured over the past several decades, it’s now becoming clear that its original advantages, such as labor cost savings, have begun to fade. In fact, it seems that our laser-like focus on cost has impacted innovation and service quality, and now the pendulum is swinging in the opposite direction. Taking […]

On the Edge—Disruption in Big Data Analysis and Business Models

On the Edge—Disruption in Big Data Analysis and Business Models

It’s 2014, and Big Data analysis is still big news. Businesses in every market segment are scrambling to use this insight to create “right-time” experiences for their customers and internal staff. When done well, Big Data analysis gives companies a clear competitive advantage. However, for many organizations, Big Data efforts have gone awry, transforming the […]

Boot Camp for Superior Business Outcomes

Boot Camp for Superior Business Outcomes

Consider Olympic track stars. They each have different backgrounds, styles and countries of origin, but only one thing really matters in the end: the person who runs the fastest is the one who wins the gold medal. To get that competitive advantage, the athlete needs more than muscular legs and a good pair of running […]

Criminals Turn to Outsourcing to Launch Distributed Denial of Service Attacks

Criminals Turn to Outsourcing to Launch Distributed Denial of Service Attacks

Here’s one sign that outsourcing has become an accepted global business strategy: the criminals have adopted it! Yes, friends, neighbors and countrymen, criminals are hiring IT experts to perform distributed denial-of-service (DDoS) attacks, which effectively bring down Websites. NSFOCUS, Inc., a company that provides enterprise-level network security solutions and services, tracked 168,459 individual DDoS attacks […]

How Texting, Veterans and SEO Helped RPO Companies Fill High-Demand Jobs

How Texting, Veterans and SEO Helped RPO Companies Fill High-Demand Jobs

Even as the economy has improved worldwide, the unemployment figures are still stubbornly high. But talking to HR and recruitment process outsourcing (RPO) executives, they are working overtime to fill certain jobs. Sometimes the skill set is too much in demand or just rare. In other cases, it is near impossible to reach the right […]

The Two Cups of Coffee Attack and Other Data Security Breaches You May Never Suspect

The Two Cups of Coffee Attack and Other Data Security Breaches You May Never Suspect

You’ve spent a lot of time securing your company’s data—with firewalls and intrusion detectors, passwords and policies. You’ve invested in vulnerability tests to identify your weakest links and conducted penetration testing to find out if these vulnerabilities could turn into liabilities. But, with all these security precautions in place, one guy, carrying two cups of […]

Open Hybrid Clouds: The Best of Both Worlds

Open Hybrid Clouds: The Best of Both Worlds

Everyone loves hybrid models. Who doesn’t want the best of both worlds? IT organizations everywhere crave “a little bit of this and a little bit of that” approach to spread their risk. They want to keep control over infrastructure, business critical apps, data and processes that help preserve IP or enable a competitive edge while […]

Get More Bang for Your Buck: Do’s and Don’ts in Formulating Cloud Computing Contracts

Get More Bang for Your Buck: Do’s and Don’ts in Formulating Cloud Computing Contracts

In late September, high-profile cloud storage start up Nirvanix told its customers to stop replicating data on its servers and migrate to other providers like Microsoft Azure, IBM SoftLayer and Amazon S3. For several reasons, Nirvanix, sitting on a tidy $70 million in funding, was shutting down . Users had until October 15 to download […]

Monitoring Your Applications’ Vital Signs—Without All the Pain

Monitoring Your Applications’ Vital Signs—Without All the Pain

You have chest pains during your morning jog. You’re a little out of breath and your stamina’s fading fast. But, when you go to the doctor, no one checks your vital signs or hooks you up to a heart monitor to find out what’s going on. Instead, you’re put into a room with a nurse […]

A Cloud of Controversy: Protect People or Privacy?

A Cloud of Controversy: Protect People or Privacy?

During the same decade that the USA PATRIOT Act conferred unprecedented powers on U.S. law enforcement officials, such trends as the consumerization of information technology (IT) and virtual servers gained traction on the enterprise data center scene. Simultaneously, the advent of cloud technology ushered in an era in which data from companies all over the […]

15 Top ITaaS Do’s and Don’ts for Enterprises

15 Top ITaaS Do’s and Don’ts for Enterprises

The IT-as-a-Service (ITaaS) model began as a way of provisioning IT services, infrastructure and support for businesses that did not really understand how to create or run IT services. The ITaaS model does this at scale in a cost-effective and predictable manner. Put another way, ITaaS is a pay-as-you-go model aimed at SMBs who want […]

Mobile Operators Think Small to Get Bigger Profits

Mobile Operators Think Small to Get Bigger Profits

Small cells that is. Whether you’re a mobile virtual network operator (MVNO) deploying services in urban or rural areas, a city official modernizing your infrastructure to attract and retain citizens, or a high tech start-up looking to join the ecosystem of suppliers emerging to address the ever growing data traffic demands, a small cell solution […]

Top Five Reasons for IT Directors to Outsource IT Services

Top Five Reasons for IT Directors to Outsource IT Services

Fear of surrendering control is probably the main factor holding many IT directors back from realizing the benefits of outsourcing IT services. But if you can find an IT services supplier who will work with you in a genuine partnership, understanding the specific needs of your business, it soon becomes clear that this fear is […]